Validation Policy Statement on the Digital Evidence Storage using First Applicable Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
Digital Evidence Storage is placed to store digital evidence files. Digital evidence is very vulnerable to damage. Therefore, making digital evidence storage need access control. Access control has several models, one of them is ABAC (Attribute-Based Access Control). ABAC is a new access control model. ABAC model has a flexible function, allows intersect with many attributes. This will be very complex and causing inconsistency and incompleteness. Access control testing is a must before access control is implemented because it is the main key in the security of a system. Especially in digital evidence storage because the data in it is very vulnerable to damage either intentionally or not. The type of access control that is widely used is ABAC because this ABAC model has a flexible function. This ABAC model intersects with many attributes, it is necessary to test the policy statement. This test is carried out to avoid inconsistencies and incompleteness in the policy statement. An example tool for testing policy statements is ACPT (Access Control Policy Testing). At ACPT there are various algorithms for creating and testing policy statements. This study uses the first applicable algorithm to test policy statements in digital evidence storage. This research has successfully tested the policy statement properly and found no inconsistencies and incompleteness.
Authors and Affiliations
Achmad Syauqi, Imam Riadi, Yudi Prayudi
Medical Image De-Noising Schemes Using Different Wavelet Threshold Techniques
In recent years most of researcher’s has done tremendous work in the field of medical image applications such as Magnetic Resonance Imaging (MRI), Ultra Sound, CT scan but still there are many research and experiments in...
MMO: Multiply-Minus-One Rule for Detecting & Ranking Positive and Negative Opinion
Hit and hot issue about reviews of any product is sentiment classification. Not only manufacturing company of the reviewed product takes decision about its quality, but the customers’ purchase of the product is also base...
Using Fuzzy Clustering Powered by Weighted Feature Matrix to Establish Hidden Semantics in Web Documents
Digital Data is growing exponentially exploding on the 'World Wide Web'. The orthodox clustering algorithms obligate various challenges to tackle, of which the most often faced challenge is the uncertainty. Web documents...
On the Dynamic Maintenance of Data Replicas based on Access Patterns in A Multi-Cloud Environment
Cloud computing provides services and infrastructures to enable end-users to access, modify and share massive geographically distributed data. There are increasing interests in developing data-intensive (big data) applic...
On the Codes over a Semilocal Finite Ring
In this paper, we study the structure of cyclic, quasi cyclic, constacyclic codes and their skew codes over the finite ring R. The Gray images of cyclic, quasi cyclic, skew cyclic, skew quasi cyclic and skew constacyclic...